MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5b2e3920a85007dc631d1599bf034847367016215b002a31594d450f27781ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f5b2e3920a85007dc631d1599bf034847367016215b002a31594d450f27781ff
SHA3-384 hash: fb7bbb7311fc2827257b2130fd88770ac32f09ab9d9c2e28a0a9f48fd416ab9410996485a2191b9807e4a0dce8701b74
SHA1 hash: 75e3f0a237a95df0795ff874203cd83418b5aba0
MD5 hash: 6b5c6091d6ded851d7bed13c773b9f1c
humanhash: shade-one-kitten-zebra
File name:Josho.ppc
Download: download sample
Signature Mirai
File size:54'288 bytes
First seen:2025-11-28 19:48:16 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 768:5tRX5w2HvvhRom9s1va1a9gxazvW5bDRQUR+Za6g8s6r4UDG3T1yjCUC:5hFs1uamazMDV5qX4QG3TeCp
TLSH T1D533F84332280F1FC5A366B0163F55E083BAFC6928F0B684655EBF968635DB71089F99
Magika elf
Reporter abuse_ch
Tags:elf mirai

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sends data to a server
Receives data from a server
Runs as daemon
Substitutes an application name
Verdict:
Unknown
Threat level:
  0/10
Confidence:
100%
Tags:
gcc masquerade
Result
Gathering data
Status:
terminated
Behavior Graph:
%3 guuid=e6c58ff4-1d00-0000-dee1-bc819b110000 pid=4507 /usr/bin/sudo guuid=a9f583f7-1d00-0000-dee1-bc81a7110000 pid=4519 /tmp/sample.bin guuid=e6c58ff4-1d00-0000-dee1-bc819b110000 pid=4507->guuid=a9f583f7-1d00-0000-dee1-bc81a7110000 pid=4519 execve
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1822562 Sample: Josho.ppc.elf Startdate: 28/11/2025 Architecture: LINUX Score: 48 16 176.97.124.206, 1549 ARCHERNETRU Ukraine 2->16 18 Multi AV Scanner detection for submitted file 2->18 8 Josho.ppc.elf 2->8         started        signatures3 process4 process5 10 Josho.ppc.elf 8->10         started        12 Josho.ppc.elf 8->12         started        process6 14 Josho.ppc.elf 10->14         started       
Threat name:
Linux.Worm.Mirai
Status:
Malicious
First seen:
2025-11-28 19:49:15 UTC
File Type:
ELF32 Big (Exe)
AV detection:
13 of 36 (36.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:mirai botnet:josho linux
Verdict:
Malicious
Tags:
Unix.Dropper.Mirai-7135957-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

elf f5b2e3920a85007dc631d1599bf034847367016215b002a31594d450f27781ff

(this sample)

  
Delivery method
Distributed via web download

Comments